Web Application Penetration By: Frank Coburn & Haris Mahboob - - PowerPoint PPT Presentation

web application penetration
SMART_READER_LITE
LIVE PREVIEW

Web Application Penetration By: Frank Coburn & Haris Mahboob - - PowerPoint PPT Presentation

Web Application Penetration By: Frank Coburn & Haris Mahboob Testing Take Aways Overview of the web Web proxy tool Reporting Gaps in the process app penetration testing process Penetration testing vs vulnerability assessment What


slide-1
SLIDE 1

Web Application Penetration Testing

By: Frank Coburn & Haris Mahboob

slide-2
SLIDE 2

Take Aways

Overview of the web app penetration testing process Web proxy tool Reporting Gaps in the process

slide-3
SLIDE 3

What is it?

§ Penetration testing vs vulnerability

assessment

§ Finding security issues, exploiting them,

and reporting on it

slide-4
SLIDE 4

Why is it needed?

FINDING VULNERABILITIES BEFORE THE BAD GUYS DO UNDERSTANDING THE APPLICATION SECURITY POSTURE LEGAL REQUIREMENTS (E.G PCI COMPLIANCE)

slide-5
SLIDE 5

Scoping the application

§ Requirements for testing § Effort days § Software/hardware requirements § Whitelisting § Testing window § Special requests § Cost

slide-6
SLIDE 6

Our Methodology

Information gathering Developing test cases Vulnerability discovery & exploitation Risk analysis Reporting Providing support

slide-7
SLIDE 7

Methodology 2 – Information Gathering

  • Your browser and dev tools are your best friend
  • Unauthenticated vulnerabilities and exposures are the most critical
  • Depending on the timeline, proceed in order of attacks that are most likely to succeed
  • Try non-intrusive methods such as searching DNS records, as well as traceroute and other

enumeration *** Stakeholders need to be notified about public exposures and unauthenticated vulnerabilities right away! ***

slide-8
SLIDE 8

Ca Case study

A WordPress site running version 4.7.0 was vulnerable to Content Injection leading to an embarrassing and potentially reputation impacting message from a script kiddie.

slide-9
SLIDE 9

Acting on Information Gathered

Application walkthrough

Discover the app’s functionality by investigating using your browser first See how much can be found without authentication. Look for common URLs, directories, and error pages

Fingerprinting

What JS framework are they using? Sometimes session cookie names give away the underlying platform: "JSESSIONID", "ASP.NetSessionID"

Analyze

Maybe you have some experience writing code in these languages Think about how you would implement this functionality, assumptions made, corners cut, etc Challenge what the developer’s assumptions in your testing

slide-10
SLIDE 10

Developing Test Cases

Breaking components

  • f the application by

issues:

  • Authentication and

authorization issues

  • Session management
  • Data validation
  • Misconfigurations
  • Network Level issues

Developing Business logic test cases:

  • Jumping user flows
  • Testing authorization

controls

slide-11
SLIDE 11

Vulnerability Discovery & Exploitation

Google everything Improvising as the test proceeds Observing application behavior Carrying out the test cases

slide-12
SLIDE 12

uhttps://www.kisspng.com/png-owasp-top-10-web-application-

security-computer-sec-4965837/

slide-13
SLIDE 13

Risk Analysis

Impact of a successful attack

  • How much damage can it cause
  • Taking business into context

Likelihood of a successful attack

  • Vulnerability discovery
  • Payload creation difficulty
  • Any mitigating controls in place
slide-14
SLIDE 14

Reporting

Security issue description Evidence Impact/Likelihood

  • f an attack

Recommendations Presentation Support

slide-15
SLIDE 15

Our Favorite Tool

§ Burp Suite Pro: § Proxy HTTP traffic § Allows modification of URL parameters

and HTTP request body

§ Useful for business logic testing § Easy searching of information sent or

received

slide-16
SLIDE 16

Gaps in the process

ASSESSMENTS ARE TIMEBOXED LIMITED TO THE TESTER’S TECHNICAL ABILITIES TEST ENVIRONMENT MISREPRESENTATION NARROW SCOPES ATTACK SURFACE LIMITATIONS

slide-17
SLIDE 17

Q&A

Questions?